Basic-Networking-Part1-Part2-Part3 - Handout
Basic-Networking-Part1-Part2-Part3 - Handout
Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable
Used for simple tasks: transferring files and sharing printers Slower performance
Network Components
End Devices
An end device is where a message originates from or where it is received. Data originates with an end
device, flows through the network, and arrives at an end device.
Network Components
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless access
points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary device,
including:
Regenerate and retransmit data signals.
Maintain information about what pathways exist in the network.
Notify other devices of errors and communication failures.
Network Components
Network Media
Communication across a network is carried through a medium which allows a message to travel from source to
destination.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.
Common Types of Networks
The Internet
The internet is a worldwide collection of
interconnected LANs and WANs.
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual
or group. The following groups were
developed to help maintain structure on
the internet:
IETF
ICANN
IAB
Common Types of Networks
Intranets and Extranets
• Video calls are made to anyone, regardless of where they are located.
• Video conferencing is a powerful tool for communicating with others.
• Video is becoming a critical requirement for effective collaboration.
• Cisco TelePresence powers is one way of working where everyone,
everywhere.
Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our data on servers over the internet.
Applications can also be accessed using the Cloud.
Allows businesses to deliver to any device anywhere in the world.
Internal Threats:
lost or stolen devices
accidental misuse by
employees
malicious employees
Network Security
Security Solutions
Security must be implemented in multiple
layers using more than one security solution.
Network security components for home or
small office network:
Antivirusand antispyware software
should be installed on end devices.
Firewallfiltering used to block
unauthorized access to the network.
Network Security
Security Solutions
(Cont.)
Larger networks have additional security
requirements:
Dedicated firewall system
Access control lists (ACL)
Intrusion prevention systems (IPS)
Virtual private networks (VPN)
The study of network security starts with a
clear understanding of the underlying switching
and routing infrastructure.
The IT Professional
The IT Professional
CCNA The Cisco Certified Network Associate (CCNA)
certification:
• demonstrates that you have a knowledge of
foundational technologies
• ensures you stay relevant with skills needed
for the adoption of next-generation
technologies.
Note: Broadcasts are used in IPv4 networks, but are not an option for IPv6. Later we will also
see “Anycast” as an additional delivery option for IPv6.
Protocols
Protocols
Network Protocol Overview
Network protocols define a Protocol Type Description
common set of rules.
• Can be implemented on
devices in: Network enable two or more devices to communicate over
Communications one or more networks
Software
Hardware Network Security secure data to provide authentication, data
Both integrity, and data encryption
• Protocols have their own:
Routing enable routers to exchange route information,
Function compare path information, and select best path
Format
Rules Service Discovery used for the automatic detection of devices or
services
Protocols
Network Protocol Functions
• Devices use agreed-upon protocols
to communicate .
• Protocols may have may have one
or functions.
Function Description
Addressing Identifies sender and receiver
Reliability Provides guaranteed delivery
Flow Control Ensures data flows at an efficient rate
Sequencing Uniquely labels each transmitted segment of data
Error Detection Determines if data became corrupted during transmission
Application Interface Process-to-process communications between network applications
Protocols
Protocol Interaction
• Networks require the use of several protocols.
• Each protocol has its own function and format.
Protocol Function
Hypertext Transfer ▪ Governs the way a web server and a web client interact
Protocol (HTTP) ▪ Defines content and format
Transmission Control ▪ Manages the individual conversations
Protocol (TCP) ▪ Provides guaranteed delivery
▪ Manages flow control
Internet Protocol (IP) Delivers messages globally from the sender to the receiver
Ethernet Delivers messages from one NIC to another NIC on the same Ethernet Local
Area Network (LAN)
Protocol Suites
Protocol Suites
Network Protocol Suites
Protocols must be able to work with other
protocols.
Protocol suite:
A group of inter-related protocols
necessary to perform a communication
function
Sets of rules that work together to
help solve a problem
The protocols are viewed in terms of layers:
Higher Layers
Lower Layers- concerned with moving
data and provide services to upper
layers
Protocol Suites
Evolution of Protocol Suites
There are several protocol suites.
• Internet Protocol Suite or TCP/IP- The
most common protocol suite and
maintained by the Internet Engineering Task
Force (IETF)
• Open Systems Interconnection (OSI)
protocols- Developed by the International
Organization for Standardization (ISO) and
the International Telecommunications Union
(ITU)
• AppleTalk- Proprietary suite release by
Apple Inc.
• Novell NetWare- Proprietary suite
developed by Novell Inc.
Protocol Suites
TCP/IP Protocol Example
5 - Session Provides services to the presentation layer and to manage data exchange.
Defines services to segment, transfer, and reassemble the data for individual
4 - Transport
communications.
3 - Network Provides services to exchange the individual pieces of data over the network.
2 - Data Link Describes methods for exchanging data frames over a common media.
1 - Physical Describes the means to activate, maintain, and de-activate physical connections.
Reference Models
The TCP/IP Reference Model
TCP/IP Model
Description
Layer
Application Represents data to the user, plus encoding and dialog control.
Network Access Controls the hardware devices and media that make up the network.
Reference Models
OSI and TCP/IP Model Comparison
Subconfiguration Modes:
To move out of any subconfiguration mode to get
back to global configuration mode, use the exit
command. To return to privilege EXEC mode, use
the end command or key combination Ctrl +Z.
• Keyword – This is a specific parameter defined in the operating system (in the figure, ip
protocols).
• Argument - This is not predefined; it is a value or variable defined by the user (in the
figure, 192.168.10.5).
The Command Structure
IOS Command Syntax Check
A command might require one or more arguments. To determine the keywords and
arguments required for a command, refer to the command syntax.
Boldface text indicates commands and keywords that are entered as shown.
Italic text indicates an argument for which the user provides the value.
Convention Description
Boldface text indicates commands and keywords that you enter literally as
boldface
shown.
italics Italic text indicates arguments for which you supply values.
The table below is a brief list of keystrokes to enhance command line editing.
Keystroke Description
Left Arrow or Ctrl+B Moves the cursor one character to the left.
Right Arrow or Ctrl+F Moves the cursor one character to the right.
• Password Guidelines:
• Use passwords that are more than eight
characters in length.
• Use a combination of upper and lowercase
letters, numbers, special characters, and/or
numeric sequences. Note: Most of the labs in this course use simple
passwords such as cisco or class. These passwords
• Avoid using the same password for all are considered weak and easily guessable and should
devices. be avoided in production environments.
• Do not use common words because they are
easily guessed.
Basic Device Configuration
Configure Passwords
▪ Note: VTY lines enable remote access using Telnet or SSH to the device. Many Cisco
switches support up to 16 VTY lines that are numbered 0 to 15.
Basic Device Configuration
Encrypt Passwords
▪ Use the show running-config command
to verify that the passwords on the
The startup-config and running-config files display device are now encrypted.
most passwords in plaintext.
To encrypt all plaintext passwords, use the service
password-encryption global config command.
Basic Device Configuration
Banner Messages
To access the switch remotely, an IP address and a subnet mask must be configured on the SVI.
To configure an SVI on a switch:
Enter the interface vlan 1 command in global configuration mode.
Next assign an IPv4 address using the ip address ip-address subnet-mask command.
Finally, enable the virtual interface using the no shutdown command.
Verify Connectivity
Verify Connectivity
Verify Connectivity with Ping
Whether your network is small and new, or you are scaling an existing network, you will
always want to be able to verify that your components are properly connected to each
other and to the internet.
• The ping command, available on most operating systems, is the most effective way to
quickly test Layer 3 connectivity between a source and destination IP address.
• The ping command uses the Internet Control Message Protocol (ICMP) echo (ICMP Type
8) and echo reply (ICMP Type 0) messages.
Verify Connectivity
Verify Connectivity with Ping (Cont.)
On a Windows 10 host, the ping command sends four consecutive ICMP echo messages and
expects four consecutive ICMP echo replies from the destination. The IOS ping sends five
ICMP echo messages and displays an indicator for each ICMP echo reply received.
Note: Other possible ping replies include Q, M, ?, or &. However, the meaning of these are out of scope for this module.
Verify Connectivity
Extended Ping
The Cisco IOS offers an "extended" mode
of the ping command.
Note: Windows implementation of traceroute (tracert) sends ICMP Echo Requests. Cisco IOS and
Linux use UDP with an invalid port number. The final destination will return an ICMP port
unreachable message.
Verify Connectivity
Extended Traceroute
Like the extended ping command, there is also an extended traceroute command. It
allows the administrator to adjust parameters related to the command operation.
The Windows tracert command allows the input of several parameters through options
in the command line. However, it is not guided like the extended traceroute IOS
command. The following output displays the available options for the
Windows tracert command:
Verify Connectivity
Extended Traceroute (Cont.)
• The Cisco IOS extended traceroute option enables
the user to create a special type of trace by
adjusting parameters related to the command
operation.
• Extended traceroute is entered in privileged EXEC
mode by typing traceroute without a destination
IP address. IOS will guide you through the
command options by presenting a number of
prompts related to the setting of all the different
parameters.